According to new research by Kaspersky's GReAT team, the online criminal activities of the Roaming Mantis Group have continued to evolve since they were first discovered in April 2018. As part of their activities, this group hacks into exploitable routers and changes their DNS configuration. This allows the attackers to redirect the router user's traffic to malicious Android apps disguised as Facebook and Chrome or to Apple phishing pages that were used to steal Apple ID credentials. Recently, Kaspersky has discovered that this group is testing a new monetization scheme by redirecting iOS users to pages that contain the Coinhive in-browser mining script rather than the normal Apple phishing page. When users are redirected to these pages, they will be shown a blank page in the browser, but their CPU utilization will jump to 90% or higher.
|2020-06-25 ⋅ Medium CSIS Techblog ⋅ |
The RoamingMantis Group’s Expansion to European Apple Accounts and Android Devices
FakeSpy FunkyBot MoqHao
|2020-02-27 ⋅ Kaspersky Labs ⋅ |
Roaming Mantis, part V: Distributed in 2019 using SMiShing and enhanced anti-researcher techniques
FunkyBot MoqHao XLoader
|2020-01-17 ⋅ |
100 more behind cockroaches?
MoqHao Emotet Predator The Thief
|2019 ⋅ Kaspersky Labs ⋅ |
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign
|2018-10-01 ⋅ Bleeping Computer ⋅ |
Roaming Mantis Group Testing Coinhive Miner Redirects on iPhones